Garage4Hackers Ranchoddas Series Webcast on Powershell for post exploitation
Usage of Powershell in Post Exploitation would be covered. We will see that how powershell could be used for post exploitation activities like key-logging, backdoors, dumping system secrets, privilege escalation, pivoting, webshells etc. All the attacks would be done on a Windows 7 machine as target.
Please Enter your name
Country Name ?
Organization / University / College
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.
Terms of Service